SANS Penetration Testing: Tag - mobile application methodology arsenal tools

Invasion of the Mobile Phone Snatchers - Part 1

[Editor's Note: Last Friday, Josh Wright did an awesome webcast on how penetration testers can extract sensitive information from mobile devices during an ethical hacking project, simulating what could happen if a bad guy snags a device and uses it to gather info to attack an organization. Josh provides some commentary as well as his … Continue reading Invasion of the Mobile Phone Snatchers - Part 1


Mobile Application Assessments - Attack Vectors and Arsenal Inventory

[Editor comment: This is the first post of an in-depth series by three skilled pen testers and great authors, focused on assessing mobile application and their associated infrastructure. The series will unfold over the next month or two. We start, naturally enough, with the overall methodology, a description of attack vectors, and an inventory of … Continue reading Mobile Application Assessments - Attack Vectors and Arsenal Inventory